Login / Signup
Optimal Security Hardening over a Probabilistic Attack Graph: A Case Study of an Industrial Control System using CySecTool.
Przemyslaw Buczkowski
Pasquale Malacaria
Chris Hankin
Andrew Fielder
Published in:
SAT-CPS@CODASPY (2022)
Keyphrases
</>
control system
attack graph
enterprise network
critical infrastructure
attack graphs
optimal strategy
security mechanisms
security requirements
control strategy
intrusion detection
access control
probabilistic model
bayesian networks
network security
cyber security
cyber attacks
optimal solution